Sciweavers

2259 search results - page 126 / 452
» Separation and information hiding
Sort
View
DIMVA
2011
13 years 1 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
12 years 15 days ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han
DELTA
2006
IEEE
14 years 4 months ago
Harmonic Distortion Measurement using Spectral Warping
Harmonic distortion may be characterised by the proportion of energy of a sinusoidal signal transferred to the harmonics. Differential time scaling resulting from the spectral war...
Donald Bailey
KES
2005
Springer
14 years 3 months ago
A Distributed Approach to Musical Composition
Current techniques for automated composition use a single algorithm, focusing on one aspect of musical generation. In our system we make use of several algorithms, distributed usin...
Michael O. Jewell, Lee Middleton, Mark S. Nixon, A...
ICDAR
1999
IEEE
14 years 2 months ago
Structured Document Segmentation and Representation by the Modified X-Y tree
In this paper we describe a top-down approach to the segmentation and representation of documents containing tabular structures. Examples of these documents are invoices and techn...
Francesca Cesarini, Marco Gori, Simone Marinai, Gi...